pytile
internalblue


pytile | internalblue | |
---|---|---|
2 | 2 | |
195 | 703 | |
1.0% | 0.7% | |
9.1 | 2.9 | |
5 days ago | 6 months ago | |
Python | Python | |
MIT License | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
pytile
-
I designed and printed a pedestal that constantly points at the current location of the ISS
Use a tile tracker, then use the unofficial API to get the location of the tile tracker: https://github.com/bachya/pytile
-
They air tagged nana because she kept running the streets.
Tile has the PyTile library that can be used to get the locations of Tiles that you own.
internalblue
-
Tech startup connects to two satellites in orbit from Earth via Bluetooth
Regarding firmware patching, look at InternalBlue [1]. I guess they did it for one IC, but obviously can't do it at will for just any IC and instead hand wave "it can be done".
But yeah, I'm sceptical, too. A gateway would have made more sense to me and does not require firmware-level cooperation with chip set manufacturers. Especially since they're not aiming to add the feature into future ICs (which could have driven sales across the whole industry), but backport it instead, competing with them.
[1] https://github.com/seemoo-lab/internalblue
-
Bluetooth relay attacks allow Tesla Model 3 / Y to be unlocked and driven away
I wonder how they deal with the channel hopping? I remember BT "Classic" derives the hoping sequence from the encryption key. Not sure if that changed significantly for BLE? So either they establish normal connections between relays and victims (meaning two keys, one between each relay and each victim), and then forward data coming out of the Link Layer between the attacker devices - or they need to sniff the whole spectrum in case there is just one key between car and fob.
Last time I checked, sniffing the full spectrum of BT required three SDRs, meaning six in total; making this attack rather expensive to pull off (no problem for professional thieves though, I guess). OTOH if they can use any BT stack (or manipulate it with e.g. InternalBlue[1]), potential carjackers just need two Android Phones and good WiFi :(
[1] InternalBlue: https://github.com/seemoo-lab/internalblue
What are some alternatives?
knob - Key Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR/EDR and BLE [CVE-2019-9506]
BLEHeartRateLogger - Bluetooth Low-Energy Heart Rate Monitor data logging in Python
bluescan - An intelligence gathering tool for hacking Bluetooth [Moved to: https://github.com/fO-000/bluing]
swiftGuard - Anti-forensic macOS tray application designed to safeguard your system by monitoring USB ports.
FindMyHistory - Track your Apple devices and look up their past location, battery levels, and more
bluing - An intelligence gathering tool for hacking Bluetooth
flipperzero-firmware - Flipper Zero firmware source code
gmplot - Plot data on Google Maps, the easy way.
Wall-of-Flippers - A simple and easy way to find Flipper Zero Devices and Bluetooth Low Energy Based Attacks
Sprytile - A Blender add-on for building tile based low-poly scenes with paint/map editor like tools
Bluetooth-Unlock - Simple script to unlock your Linux based Computer using a Bluetooth device when nearby

